@inproceedings{ButenwegNorda2013, author = {Butenweg, Christoph and Norda, Hannah}, title = {Nonlinear analysis of masonry structures according to Eurocode 8}, series = {Proceedings - Vienna Congress on Recent Advances in Earthquake Engineering and Structural Dynamics 2013 (VEESD 2013)}, booktitle = {Proceedings - Vienna Congress on Recent Advances in Earthquake Engineering and Structural Dynamics 2013 (VEESD 2013)}, editor = {Adam, Christoph and Heuer, Rudolf and Lenhardt, Wolfgang and Schranz, Christian}, isbn = {978-3-902749-04-8}, year = {2013}, language = {en} } @inproceedings{AltayButenwegKlinkel2013, author = {Altay, Okyay and Butenweg, Christoph and Klinkel, Sven}, title = {Vibration control of slender structures by semi-active tuned liquid column dampers}, series = {Conference of the ASCE Engineering Mechanics Institute , Evanston, IL , USA , EMI 2013 , 2013-08-04 - 2013-08-07}, booktitle = {Conference of the ASCE Engineering Mechanics Institute , Evanston, IL , USA , EMI 2013 , 2013-08-04 - 2013-08-07}, pages = {1 Seite}, year = {2013}, language = {en} } @inproceedings{AltayButenwegKlinkel2014, author = {Altay, Okyay and Butenweg, Christoph and Klinkel, Sven}, title = {Vibration mitigation of wind turbine towers by a new semiactive Tuned Liquid Column Damper}, series = {6. Word Congress on Structural Control and Monitoring, 15 - 17 July, 2014 Barcelona,Spain}, booktitle = {6. Word Congress on Structural Control and Monitoring, 15 - 17 July, 2014 Barcelona,Spain}, year = {2014}, language = {en} } @inproceedings{SchulteTiggesMatheisRekeetal.2023, author = {Schulte-Tigges, Joschua and Matheis, Dominik and Reke, Michael and Walter, Thomas and Kaszner, Daniel}, title = {Demonstrating a V2X enabled system for transition of control and minimum risk manoeuvre when leaving the operational design domain}, series = {HCII 2023: HCI in Mobility, Transport, and Automotive Systems}, booktitle = {HCII 2023: HCI in Mobility, Transport, and Automotive Systems}, editor = {Kr{\"o}mker, Heidi}, publisher = {Springer}, address = {Cham}, isbn = {978-3-031-35677-3 (Print)}, doi = {10.1007/978-3-031-35678-0_12}, pages = {200 -- 210}, year = {2023}, abstract = {Modern implementations of driver assistance systems are evolving from a pure driver assistance to a independently acting automation system. Still these systems are not covering the full vehicle usage range, also called operational design domain, which require the human driver as fall-back mechanism. Transition of control and potential minimum risk manoeuvres are currently research topics and will bridge the gap until full autonomous vehicles are available. The authors showed in a demonstration that the transition of control mechanisms can be further improved by usage of communication technology. Receiving the incident type and position information by usage of standardised vehicle to everything (V2X) messages can improve the driver safety and comfort level. The connected and automated vehicle's software framework can take this information to plan areas where the driver should take back control by initiating a transition of control which can be followed by a minimum risk manoeuvre in case of an unresponsive driver. This transition of control has been implemented in a test vehicle and was presented to the public during the IEEE IV2022 (IEEE Intelligent Vehicle Symposium) in Aachen, Germany.}, language = {en} } @inproceedings{GaldiHartungDugelay2017, author = {Galdi, Chiara and Hartung, Frank and Dugelay, Jean-Luc}, title = {Videos versus still images: Asymmetric sensor pattern noise comparison on mobile phones}, series = {Electronic Imaging}, booktitle = {Electronic Imaging}, publisher = {Society for Imaging Science and Technology}, address = {Springfield, Virginia}, issn = {2470-1173}, doi = {10.2352/ISSN.2470-1173.2017.7.MWSF-331}, pages = {100 -- 103}, year = {2017}, abstract = {Nowadays, the most employed devices for recoding videos or capturing images are undoubtedly the smartphones. Our work investigates the application of source camera identification on mobile phones. We present a dataset entirely collected by mobile phones. The dataset contains both still images and videos collected by 67 different smartphones. Part of the images consists in photos of uniform backgrounds, especially collected for the computation of the RSPN. Identifying the source camera given a video is particularly challenging due to the strong video compression. The experiments reported in this paper, show the large variation in performance when testing an highly accurate technique on still images and videos.}, language = {en} } @inproceedings{SchulzeBuxlohGross2021, author = {Schulze-Buxloh, Lina and Groß, Rolf Fritz}, title = {Interdisciplinary Course Smart Building Engineering: A new approach of teaching freshmen in remote teamwork project under pandemic restrictions}, series = {New Perspectives in Science Education - International Conference}, booktitle = {New Perspectives in Science Education - International Conference}, publisher = {Filodiritto}, address = {Bologna}, pages = {4 Seiten}, year = {2021}, abstract = {In the context of the Corona pandemic and its impact on teaching like digital lectures and exercises a new concept especially for freshmen in demanding courses of Smart Building Engineering became necessary. As there were hardly any face-to-face events at the university, the new teaching concept should enable a good start into engineering studies under pandemic conditions anyway and should also replace the written exam at the end. The students should become active themselves in small teams instead of listening passively to a lecture broadcast online with almost no personal contact. For this purpose, a role play was developed in which the freshmen had to work out a complete solution to the realistic problem of designing, construction planning and implementing a small guesthouse. Each student of the team had to take a certain role like architect, site manager, BIM-manager, electrician and the technitian for HVAC installations. Technical specifications must be complied with, as well as documentation, time planning and cost estimate. The final project folder had to contain technical documents like circuit diagrams for electrical components, circuit diagrams for water and heating, design calculations and components lists. On the other hand construction schedule, construction implementation plan, documentation of the construction progress and minutes of meetings between the various trades had to be submitted as well. In addition to the project folder, a model of the construction project must also be created either as a handmade model or as a digital 3D-model using Computer-aided design (CAD) software. The first steps in the field of Building information modelling (BIM) had also been taken by creating a digital model of the building showing the current planning status in real time as a digital twin. This project turned out to be an excellent training of important student competencies like teamwork, communication skills, and self -organisation and also increased motivation to work on complex technical questions. The aim of giving the student a first impression on the challenges and solutions in building projects with many different technical trades and their points of view was very well achieved and should be continued in the future.}, language = {en} } @inproceedings{KueppersSchubaNeugebaueretal.2023, author = {K{\"u}ppers, Malte and Schuba, Marko and Neugebauer, Georg and H{\"o}ner, Tim and Hack, Sacha}, title = {Security analysis of the KNX smart building protocol}, series = {ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security}, booktitle = {ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security}, publisher = {ACM}, doi = {10.1145/3600160.3605167}, pages = {1 -- 7}, year = {2023}, abstract = {KNX is a protocol for smart building automation, e.g., for automated heating, air conditioning, or lighting. This paper analyses and evaluates state-of-the-art KNX devices from manufacturers Merten, Gira and Siemens with respect to security. On the one hand, it is investigated if publicly known vulnerabilities like insecure storage of passwords in software, unencrypted communication, or denialof-service attacks, can be reproduced in new devices. On the other hand, the security is analyzed in general, leading to the discovery of a previously unknown and high risk vulnerability related to so-called BCU (authentication) keys.}, language = {en} } @inproceedings{MohanGrossMenzeletal.2021, author = {Mohan, Nijanthan and Groß, Rolf Fritz and Menzel, Karsten and Theis, Fabian}, title = {Opportunities and Challenges in the Implementation of Building Information Modeling for Prefabrication of Heating, Ventilation and Air Conditioning Systems in Small and Medium-Sized Contracting Companies in Germany - A Case Study}, series = {WIT Transactions on The Built Environment, Vol. 205}, booktitle = {WIT Transactions on The Built Environment, Vol. 205}, publisher = {WIT Press}, address = {Southampton}, issn = {1743-3509}, doi = {10.2495/BIM210101}, pages = {117 -- 126}, year = {2021}, abstract = {Even though BIM (Building Information Modelling) is successfully implemented in most of the world, it is still in the early stages in Germany, since the stakeholders are sceptical of its reliability and efficiency. The purpose of this paper is to analyse the opportunities and obstacles to implementing BIM for prefabrication. Among all other advantages of BIM, prefabrication is chosen for this paper because it plays a vital role in creating an impact on the time and cost factors of a construction project. The project stakeholders and participants can explicitly observe the positive impact of prefabrication, which enables the breakthrough of the scepticism factor among the small-scale construction companies. The analysis consists of the development of a process workflow for implementing prefabrication in building construction followed by a practical approach, which was executed with two case studies. It was planned in such a way that, the first case study gives a first-hand experience for the workers at the site on the BIM model so that they can make much use of the created BIM model, which is a better representation compared to the traditional 2D plan. The main aim of the first case study is to create a belief in the implementation of BIM Models, which was succeeded by the execution of offshore prefabrication in the second case study. Based on the case studies, the time analysis was made and it is inferred that the implementation of BIM for prefabrication can reduce construction time, ensures minimal wastes, better accuracy, less problem-solving at the construction site. It was observed that this process requires more planning time, better communication between different disciplines, which was the major obstacle for successful implementation. This paper was carried out from the perspective of small and medium-sized mechanical contracting companies for the private building sector in Germany.}, language = {en} } @inproceedings{BuesgenKloeserKohletal.2023, author = {B{\"u}sgen, Andr{\´e} and Kl{\"o}ser, Lars and Kohl, Philipp and Schmidts, Oliver and Kraft, Bodo and Z{\"u}ndorf, Albert}, title = {From cracked accounts to fake IDs: user profiling on German telegram black market channels}, series = {Data Management Technologies and Applications}, booktitle = {Data Management Technologies and Applications}, editor = {Cuzzocrea, Alfredo and Gusikhin, Oleg and Hammoudi, Slimane and Quix, Christoph}, publisher = {Springer}, address = {Cham}, isbn = {978-3-031-37889-8 (Print)}, doi = {10.1007/978-3-031-37890-4_9}, pages = {176 -- 202}, year = {2023}, abstract = {Messenger apps like WhatsApp and Telegram are frequently used for everyday communication, but they can also be utilized as a platform for illegal activity. Telegram allows public groups with up to 200.000 participants. Criminals use these public groups for trading illegal commodities and services, which becomes a concern for law enforcement agencies, who manually monitor suspicious activity in these chat rooms. This research demonstrates how natural language processing (NLP) can assist in analyzing these chat rooms, providing an explorative overview of the domain and facilitating purposeful analyses of user behavior. We provide a publicly available corpus of annotated text messages with entities and relations from four self-proclaimed black market chat rooms. Our pipeline approach aggregates the extracted product attributes from user messages to profiles and uses these with their sold products as features for clustering. The extracted structured information is the foundation for further data exploration, such as identifying the top vendors or fine-granular price analyses. Our evaluation shows that pretrained word vectors perform better for unsupervised clustering than state-of-the-art transformer models, while the latter is still superior for sequence labeling.}, language = {en} } @inproceedings{KohlFreyerKraemeretal.2023, author = {Kohl, Philipp and Freyer, Nils and Kr{\"a}mer, Yoka and Werth, Henri and Wolf, Steffen and Kraft, Bodo and Meinecke, Matthias and Z{\"u}ndorf, Albert}, title = {ALE: a simulation-based active learning evaluation framework for the parameter-driven comparison of query strategies for NLP}, series = {Deep Learning Theory and Applications}, booktitle = {Deep Learning Theory and Applications}, editor = {Conte, Donatello and Fred, Ana and Gusikhin, Oleg and Sansone, Carlo}, publisher = {Springer}, address = {Cham}, isbn = {978-3-031-39058-6 (Print)}, doi = {10.1007/978-3-031-39059-3_16}, pages = {235 -- 253}, year = {2023}, abstract = {Supervised machine learning and deep learning require a large amount of labeled data, which data scientists obtain in a manual, and time-consuming annotation process. To mitigate this challenge, Active Learning (AL) proposes promising data points to annotators they annotate next instead of a subsequent or random sample. This method is supposed to save annotation effort while maintaining model performance. However, practitioners face many AL strategies for different tasks and need an empirical basis to choose between them. Surveys categorize AL strategies into taxonomies without performance indications. Presentations of novel AL strategies compare the performance to a small subset of strategies. Our contribution addresses the empirical basis by introducing a reproducible active learning evaluation (ALE) framework for the comparative evaluation of AL strategies in NLP. The framework allows the implementation of AL strategies with low effort and a fair data-driven comparison through defining and tracking experiment parameters (e.g., initial dataset size, number of data points per query step, and the budget). ALE helps practitioners to make more informed decisions, and researchers can focus on developing new, effective AL strategies and deriving best practices for specific use cases. With best practices, practitioners can lower their annotation costs. We present a case study to illustrate how to use the framework.}, language = {en} }